A systematic review of security requirements engineering
One of the most important aspects in the achievement of secure software systems in the
software development process is what is known as Security Requirements Engineering …
software development process is what is known as Security Requirements Engineering …
Exploring software security approaches in software development lifecycle: A systematic mapping study
There is an increase use of security driven approaches to support software development
activities, such as requirements, design and implementation. The objective of this paper is to …
activities, such as requirements, design and implementation. The objective of this paper is to …
Methodological framework for analysis and synthesis of a set of secure software development controls
AV Barabanov, AS Markov, VL Tsirlov - Journal of Theoretical and …, 2016 - elibrary.ru
This article discusses the issues of standardizing commercial production of secure software
products. It studies administrative and technical controls for minimizing the number of …
products. It studies administrative and technical controls for minimizing the number of …
Implementing information security best practices on software lifecycle processes: The ISO/IEC 15504 Security Extension
AL Mesquida, A Mas - Computers & Security, 2015 - Elsevier
The ISO/IEC 15504 international standard can be aligned with the ISO/IEC 27000
information security management framework. During the research conducted all the existing …
information security management framework. During the research conducted all the existing …
Vulnerably (mis) configured? Exploring 10 years of developers' Q&As on Stack Overflow
The increasing number of attacks exploiting system vulnerabilities in recent years underpins
the growing importance of security; especially for software comprising configuration options …
the growing importance of security; especially for software comprising configuration options …
Security requirements engineering framework for software product lines
CONTEXT: The correct analysis and understanding of security requirements are important
because they assist in the discovery of any security or requirement defects or mistakes …
because they assist in the discovery of any security or requirement defects or mistakes …
ASE: A comprehensive pattern-driven security methodology for distributed systems
AV Uzunov, EB Fernandez, K Falkner - Computer Standards & Interfaces, 2015 - Elsevier
Incorporating security features is one of the most important and challenging tasks in
designing distributed systems. Over the last decade, researchers and practitioners have …
designing distributed systems. Over the last decade, researchers and practitioners have …
A product-line-engineering framework for secure enterprise-resource-planning systems
Abstract Enterprise-resource-planning (ERP) systems are highly complex, incorporating
critical data and configuration options that can easily cause security threats or risks. While …
critical data and configuration options that can easily cause security threats or risks. While …
[PDF][PDF] Privacy threats in software architectures
K Wuyts - PhD (Jan. 2015), 2015 - lirias.kuleuven.be
With privacy becoming a key concern in modern society, it is important that privacy
measures are strongly incorporated whenever digital data are involved. Unfortunately …
measures are strongly incorporated whenever digital data are involved. Unfortunately …
Synthesis of secure software development controls
A Barabanov, A Markov, A Fadin, V Tsirlov… - Proceedings of the 8th …, 2015 - dl.acm.org
A study of the available approaches aimed at mitigating vulnerabilities in the software
development, and their applicability during the software compliance evaluation was carried …
development, and their applicability during the software compliance evaluation was carried …